![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > General
This book includes extended versions of selected works presented at the 52nd Annual Convention of Computer Society of India (CSI 2017), held at Science City, Kolkata on 19-21 January 2018. It features a collection of chapters focusing on recent trends in computational intelligence, covering topics such as ANN, neuro-fuzzy based clustering, edge detection, data mining, mobile cloud computing, intelligent scheduling, processing and authentication. It also discusses societal applications of these methods. As such it is useful for students, researchers and industry professionals working in the area of computational intelligence.
"Industrial applications of evolutionary algorithms" is intended as a resource for both experienced users of evolutionary algorithms and researchers that are beginning to approach these fascinating optimization techniques. Experienced users will find interesting details of real-world problems, advice on solving issues related to fitness computation or modeling, and suggestions on how to set the appropriate parameters to reach optimal solutions. Beginners will find a thorough introduction to evolutionary computation, and a complete presentation of several classes of evolutionary algorithms exploited to solve different problems. Inside, scholars will find useful examples on how to fill the gap between purely theoretical examples and industrial problems. The collection of case studies presented is also extremely appealing for anyone interested in Evolutionary Computation, but without direct access to extensive technical literature on the subject. After the introduction, each chapter in the book presents a test case, and is organized so that it can be read independently from the rest: all the information needed to understand the problem and the approach is reported in each part. Chapters are grouped by three themes of particular interest for real-world applications, namely prototype-based validation, reliability and test generation. The authors hope that this volume will help to expose the flexibility and efficiency of evolutionary techniques, encouraging more companies to adopt them; and that, most of all, you will enjoy your reading.
This book constitutes the refereed proceedings of the Second IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2011, held in Costa de Caparica, Portugal, in February 2011. The 67 revised full papers were carefully selected from numerous submissions. They cover a wide spectrum of topics ranging from collaborative enterprise networks to microelectronics. The papers are organized in topical sections on collaborative networks, service-oriented systems, computational intelligence, robotic systems, Petri nets, sensorial and perceptional systems, sensorial systems and decision, signal processing, fault-tolerant systems, control systems, energy systems, electrical machines, and electronics.
Evolutionary algorithms are successful biologically inspired meta-heuristics. Their success depends on adequate parameter settings. The question arises: how can evolutionary algorithms learn parameters automatically during the optimization? Evolution strategies gave an answer decades ago: self-adaptation. Their self-adaptive mutation control turned out to be exceptionally successful. But nevertheless self-adaptation has not achieved the attention it deserves. This book introduces various types of self-adaptive parameters for evolutionary computation. Biased mutation for evolution strategies is useful for constrained search spaces. Self-adaptive inversion mutation accelerates the search on combinatorial TSP-like problems. After the analysis of self-adaptive crossover operators the book concentrates on premature convergence of self-adaptive mutation control at the constraint boundary. Besides extensive experiments, statistical tests and some theoretical investigations enrich the analysis of the proposed concepts.
This book brings together historical notes, reviews of research developments, fresh ideas on how to make VC (Vapnik-Chervonenkis) guarantees tighter, and new technical contributions in the areas of machine learning, statistical inference, classification, algorithmic statistics, and pattern recognition. The contributors are leading scientists in domains such as statistics, mathematics, and theoretical computer science, and the book will be of interest to researchers and graduate students in these domains.
Mobile agents are software nomads that act as your personal
representative, working autonomously through networks. They are
able to visit network nodes directly using available computing
power and are not limited by platform. This emerging field is now
poised to become a cornerstone for new Web-based ubiquitous
computing environments. Mobile Agents provides a practical
introduction to mobile agent technology and surveys the state of
the art in mobile agent research. Students and researchers can use
the book as an introduction to the concepts and possibilities of
this field and as an overview of ongoing research. Developers can
use it to identify the capabilities of the technology to decide if
mobile agents are the right solution for them. Practioners can also
gain hands-on experience in programming mobile agents through
exploration of the source code for a complete mobile agent
environment available through the companion website.
Singularity Hypotheses: A Scientific and Philosophical Assessment offers authoritative, jargon-free essays and critical commentaries on accelerating technological progress and the notion of technological singularity. It focuses on conjectures about the intelligence explosion, transhumanism, and whole brain emulation. Recent years have seen a plethora of forecasts about the profound, disruptive impact that is likely to result from further progress in these areas. Many commentators however doubt the scientific rigor of these forecasts, rejecting them as speculative and unfounded. We therefore invited prominent computer scientists, physicists, philosophers, biologists, economists and other thinkers to assess the singularity hypotheses. Their contributions go beyond speculation, providing deep insights into the main issues and a balanced picture of the debate.
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and
algorithms which are the basis for applications of artificial
intelligence environments.
There are many invaluable books available on data mining theory and applications. However, in compiling a volume titled DATA MINING: Foundations and Intelligent Paradigms: Volume 1: Clustering, Association and Classification we wish to introduce some of the latest developments to a broad audience of both specialists and non-specialists in this field. "
The growth in the amount of data collected and generated has exploded in recent times with the widespread automation of various day-to-day activities, advances in high-level scienti?c and engineering research and the development of e?cient data collection tools. This has given rise to the need for automa- callyanalyzingthedatainordertoextractknowledgefromit, therebymaking the data potentially more useful. Knowledge discovery and data mining (KDD) is the process of identifying valid, novel, potentially useful and ultimately understandable patterns from massive data repositories. It is a multi-disciplinary topic, drawing from s- eral ?elds including expert systems, machine learning, intelligent databases, knowledge acquisition, case-based reasoning, pattern recognition and stat- tics. Many data mining systems have typically evolved around well-organized database systems (e.g., relational databases) containing relevant information. But, more and more, one ?nds relevant information hidden in unstructured text and in other complex forms. Mining in the domains of the world-wide web, bioinformatics, geoscienti?c data, and spatial and temporal applications comprise some illustrative examples in this regard. Discovery of knowledge, or potentially useful patterns, from such complex data often requires the - plication of advanced techniques that are better able to exploit the nature and representation of the data. Such advanced methods include, among o- ers, graph-based and tree-based approaches to relational learning, sequence mining, link-based classi?cation, Bayesian networks, hidden Markov models, neural networks, kernel-based methods, evolutionary algorithms, rough sets and fuzzy logic, and hybrid systems. Many of these methods are developed in the following chapters
Robotized Transcranial Magnetic Stimulation describes the methods needed to develop a robotic system that is clinically applicable for the application of transcranial magnetic stimulation (TMS). Chapter 1 introduces the basic principles of TMS and discusses current developments towards robotized TMS. Part I (Chapters 2 and 3) systematically analyzes and clinically evaluates robotized TMS. More specifically, it presents the impact of head motion on the induced electric field. In Part II (Chapters 3 to 8), a new method for a robust robot/camera calibration, a sophisticated force-torque control with hand-assisted positioning, a novel FTA-sensor for system safety, and techniques for direct head tracking, are described and evaluated. Part III discusses these developments in the context of safety and clinical applicability of robotized TMS and presents future prospects of robotized TMS. Robotized Transcranial Magnetic Stimulation is intended for researchers as a guide for developing effective robotized TMS solutions. Professionals and practitioners may also find the book valuable.
Stochastic local search (SLS) algorithms are among the most
prominent and successful techniques for solving computationally
difficult problems in many areas of computer science and operations
research, including propositional satisfiability, constraint
satisfaction, routing, and scheduling. SLS algorithms have also
become increasingly popular for solving challenging combinatorial
problems in many application areas, such as e-commerce and
bioinformatics.
Artificial intelligence provides an environmentally rich paradigm within which design research based on computational constructions can be carried out. This has been one of the foundations for the developing field called "design computing." Recently, there has been a growing interest in what designers do when they design and how they use computational tools. This forms the basis of a newly emergent field called "design cognition" that draws partly on cognitive science. This new conference series aims to provide a bridge between the two fields of "design computing" and "design cognition." The papers in this volume are from the "First International Conference on Design Computing and Cognition" (DCC'04) held at the Massachusetts Institute of Technology, USA. They represent state-of-the art research and development in design computing and cognition. They are of particular interest to researchers, developers and users of advanced computation in design and those who need to gain a better understanding of designing.
Chapter 1 Introduction introduction 3 Chapter 1 Introduction ; ; / 2 4 F F # D . < 4 " % %+ " % )+ " % '+ 4 G G % & % : 2 < 4 4 = . % > 2 " % (+ 4 chapter one 1.1 Argument Assistants 4 4 , 2 # 4 2 < H ! H 4 H F H H / ! H ! " # 4 H H H H F H introduction 5 H H 2 . H H G 2 4 2 2 1.2 Defeasible Argumentation in the Field of Law 4 4 3 " 8 2 2 , < 2 " # < , # 6 chapter one " + 4 # 4 6 1 G G 6 4 G " + , G < # # A # 0 # # 4 2 # # D G %@*$ # 4 "%@:*+ F , introduction 7 , 9 2 2 , 3 . G # , " + D F < H 4 H H 4 H 4 4 1.3 Theory Construction and the Application of Law to Cases 4 I H # " ", % %+ 8 chapter one " + 8 4 G , 2 D 2 < " + " + 4 # #< 2 introduction 9 2 4 # , 2 4 # 9 < # ! / 2 6 # I ", % )J % '+ 9 G # 9 2
The rapidly growing amount of data, available from di?erent technologies in the ?eld of bio-sciences, high-energy physics, economy, climate analysis, and in several other scienti?c disciplines, requires a new generation of machine learning and statistical methods to deal with their complexity and hete- geneity. As data collections becomes easier, data analysis is required to be more sophisticated in order to extract useful information from the available data. Even if data can be represented in several ways, according to their structural characteristics, ranging from strings, lists, trees to graphs and other more complex data structures, in most applications they are typically represented as a matrix whose rows correspond to measurable characteristics called f- tures, attributes, variables, depending on the considered discipline and whose columns correspond to examples (cases, samples, patterns). In order to avoid confusion,we will talk about features and examples.In real-worldtasks,there canbe manymorefeatures than examples(cancer classi?cationbasedongene expressionlevels in bioinformatics) or there can be many more examples than features(intrusion detection in computer/networksecurity). In addition, each example can be either labeled or not. Attaching labels allows to distinguish members of the same class or group from members of other classes or groups. Hence, one can talk about supervised and unsupervised tasks that can be solved by machine learning methods. Since it is widely accepted that no single classi?er or clustering algorithm canbesuperiortotheothers,ensemblesofsupervisedandunsupervisedme- ods are gaining popularity. A typical ensemble includes a number of clas- ?ers/clustererswhosepredictionsarecombinedtogetheraccordingtoacertain rule, e.g. majority vote.
After an introduction to renewable energy technologies, the authors present computational intelligence techniques for optimizing the manufacture of related technologies, including solar concentrators. In particular the authors present new applications for their neural classifiers for image and pattern recognition. The book will be of interest to researchers in computational intelligence, in particular in the domain of neural networks, and engineers engaged with renewable energy technologies.
The book focuses on different variants of decision tree induction but also describes the meta-learning approach in general which is applicable to other types of machine learning algorithms. The book discusses different variants of decision tree induction and represents a useful source of information to readers wishing to review some of the techniques used in decision tree learning, as well as different ensemble methods that involve decision trees. It is shown that the knowledge of different components used within decision tree learning needs to be systematized to enable the system to generate and evaluate different variants of machine learning algorithms with the aim of identifying the top-most performers or potentially the best one. A unified view of decision tree learning enables to emulate different decision tree algorithms simply by setting certain parameters. As meta-learning requires running many different processes with the aim of obtaining performance results, a detailed description of the experimental methodology and evaluation framework is provided. Meta-learning is discussed in great detail in the second half of the book. The exposition starts by presenting a comprehensive review of many meta-learning approaches explored in the past described in literature, including for instance approaches that provide a ranking of algorithms. The approach described can be related to other work that exploits planning whose aim is to construct data mining workflows. The book stimulates interchange of ideas between different, albeit related, approaches.
In recent years computational intelligence has been extended by adding many other subdisciplines and this new field requires a series of challenging problems that will give it a sense of direction in order to ensure that research efforts are not wasted. This book written by top experts in computational intelligence provides such clear directions and a much-needed focus on the most important and challenging research issues.
Bayesian networks are now being used in a variety of artificial intelligence applications. These networks are high-level representations of probability distributions over a set of variables that are used for building a model of the problem domain. ""Bayesian Network Technologies: Applications and Graphical Models"" provides an excellent and well-balanced collection of areas where Bayesian networks have been successfully applied. This book describes the underlying concepts of Bayesian Networks in an interesting manner with the help of diverse applications, and theories that prove Bayesian networks valid. ""Bayesian Network Technologies: Applications and Graphical Models"" provides specific examples of how Bayesian networks are powerful machine learning tools critical in solving real-life problems.
Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.
The unexpected and premature passing away of Professor Ebrahim H. "Abe" Mamdani on January, 22, 2010, was a big shock to the scientific community, to all his friends and colleagues around the world, and to his close relatives. Professor Mamdani was a remarkable figure in the academic world, as he contributed to so many areas of science and technology. Of great relevance are his latest thoughts and ideas on the study of language and its handling by computers. The fuzzy logic community is particularly indebted to Abe Mamdani (1941-2010) who, in 1975, in his famous paper An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller, jointly written with his student Sedrak Assilian, introduced the novel idea of fuzzy control. This was an elegant engineering approach to the modeling and control of complex processes for which mathematical models were unknown or too difficult to build, yet they could effectively and efficiently be controlled by human operators. This ground-breaking idea has found innumerable applications and can be considered as one of the main factors for the proliferation and adoption of fuzzy logic technology. Professor Mamdani's own life and vital experience are illustrative of his "never surrendering" attitude while facing adversaries, which is normal for a person proposing any novel solution, and represent a great example for everybody. His subtle sense of humor, his joy for life, and his will to critically help people, especially young people, were characteristics deeply appreciated by all the people who enjoyed and benefited from his friendship and advice. This book constitutes a posthumous homage to Abe Mamdani. It is a collection of original papers related in some way to his works, ideas and vision, and especially written by researchers directly acquainted with him or with his work. The underlying goal of this book will be fulfilled if, in the very spirit of Mamdani's legacy, the papers will trigger a scientific or philosophical debate on the issues covered, or contribute to a cross-fertilization of ideas in the various fields.
This thesis presents a novel neuro-fuzzy modeling approach for grasp neuroprostheses. At first, it offers a detailed study of discomfort due to the application of Functional Electrical Stimulation to the upper limb. Then, it discusses briefly previous methods to model hand movements induced by FES with the purpose of introducing the new modeling approach based on intelligent systems. This approach is thoroughly described in the book, together with the proposed application to induce hand and finger movements by means of a surface FES system based on multi-field electrodes. The validation tests, carried out on both healthy and neurologically impaired subjects, demonstrate the efficacy of the proposed modeling method. All in all, the book proposes an innovative system based on fuzzy neural networks that is expected to improve the design and validation of advanced control systems for non-invasive grasp neuroprostheses.
Evolutionary algorithms are sophisticated search methods that have been found to be very efficient and effective in solving complex real-world multi-objective problems where conventional optimization tools fail to work well. Despite the tremendous amount of work done in the development of these algorithms in the past decade, many researchers assume that the optimization problems are deterministic and uncertainties are rarely examined. The primary motivation of this book is to provide a comprehensive introduction on the design and application of evolutionary algorithms for multi-objective optimization in the presence of uncertainties. In this book, we hope to expose the readers to a range of optimization issues and concepts, and to encourage a greater degree of appreciation of evolutionary computation techniques and the exploration of new ideas that can better handle uncertainties. "Evolutionary Multi-Objective Optimization in Uncertain Environments: Issues and Algorithms" is intended for a wide readership and will be a valuable reference for engineers, researchers, senior undergraduates and graduate students who are interested in the areas of evolutionary multi-objective optimization and uncertainties. |
You may like...
Introduction to Basic Aspects of the…
Otto Appenzeller, Guillaume J. Lamotte, …
Hardcover
R3,484
Discovery Miles 34 840
Successful Women in Chemistry…
Amber S. Hinkle, Jody A. Kocsis
Hardcover
R2,795
Discovery Miles 27 950
Computational Electromagnetics
Konada Umashankar, Allen Taflove
Hardcover
R4,902
Discovery Miles 49 020
Supervised and Unsupervised Learning for…
Michael W. Berry, Azlinah Mohamed, …
Hardcover
R2,533
Discovery Miles 25 330
Social Media and Mobile Technologies for…
Mowafa Househ, Elizabeth Borycki, …
Hardcover
R6,153
Discovery Miles 61 530
|